in the protection of such information. Based on the
MaPSaF instrument, that discusses the safety of pa-
tients, we constructed the Information Security Em-
ployee’s Evaluation (ISEE) to evaluate information
security with health care workers.
Overall, this pilot study showed that the instru-
ment is useful to:
• Discuss medical information security within a
hospital department.
• Identify and discuss weak and strong points.
• Discuss different perceptions on information se-
curity between employees.
A workshop can best be held at one single depart-
ment (i.e. an outpatient clinic or nursing department).
At Workshop IV two departments participated. Some
security issues that were problematic at one depart-
ment (availability of electronic nursing records) were
neverheard of at the other department. It was interest-
ing to see such differences between departments. It is,
however, hard to discuss and identify single points for
improvements with such diverse groups. We, there-
fore, recommend using the evaluation within a single
department.
The multidisciplinary set-up of participants high-
lighted various perceptions on information security.
For instance, Workshop III indicated that manage-
ment had a very positive view on incident handling.
Further discussion however, showed that staff had no
idea how to report problems, and even when they did,
they were not pleased with the department’s solving
skills. At Workshop II the multidisciplinary set-up
even took care of some quick fixes: A doctor indi-
cated that during night shift, magnetic resonance in-
formation about patients was not available. An em-
ployee of the IT supportive staff argued that this was
an unknown issue, yet provided a quick solution.
Reflecting on all five workshops of the pilot study,
we found that the dimensions priority and responsi-
bility show the least amount of variance and range
of scores. These dimensions, since they relate to
attitude, might suffer social desirability bias. Floor
effects occurred most frequently at the dimensions
functionality and supervision. A majority of these
low scores was explained by the participants. Ceiling
scores were only given by management staff. Overall,
management gave relatively higher scores than direct
health care workers which might indicate a too opti-
mistic view by management.
For future purposes, it might be interesting to fur-
ther develop the instrument and apply it as a measure-
ment instrument in a survey-format. Dimensions can
be further defined with specific characteristics. To
give an example, the dimension training and educa-
tion could be further defined on the issues ‘knowledge
of privacy legislation’, ‘knowledge of information se-
curity’ and ‘knowledge on how to use security con-
trols’. Such refinement makes the instrument more
applicable for actual measurement within a hospital
environment. Further work, then, will be needed to
address these characteristics specifically. Also, such
a measurement instrument, gives opportunities to ex-
amine in greater depth the instrument’s psychometric
properties including measures of internal consistency,
reliability and construct validity.
This research has shown that the ISEE instrument
can effectively assist health professionals in their ef-
forts to improveinformation security within their hos-
pital departments. The ISEE instrument has by no
means the comprehensiveness and completeness of
existing standards or other security checklists. We do,
however, argue that the instrument and the human per-
spective can provide additional insights. Implement-
ing secure systems does involve health care workers,
both in respect of functionalsecurity controls as in hu-
man characteristics such as awareness, responsibility
and knowledge.
REFERENCES
Ashenden, D. (2008). Information security management:
A human challenge? Information Security Technical
Report, 13(4):195–201.
Barber, B. (1998). Patient data and security: an
overview. International Journal of Medical Informat-
ics, 49(1):19–30.
Dhillon, G. and Backhouse, J. (2001). Current di-
rections in IS security research: towards socio-
organizational perspectives. Information Systems
Journal, 11(2):127–154.
Fernando, J. I. and Dawson, L. L. (2009). The health infor-
mation system security threat lifecycle: An informat-
ics theory. International Journal of Medical Informat-
ics, 78(12):815–826.
Ferreira, A., Antunes, L., Chadwick, D., and Correia, R.
(2010). Grounding information security in health-
care. International Journal of Medical Informatics,
79(4):268–283.
Gaunt, N. (2000). Practical approaches to creating a secu-
rity culture. International Journal of Medical Infor-
matics, 60(2):151–157.
Hevner, A. R., March, S. T., Park, J., and Ram, S. (2004).
Design science in information systems research. MIS
Quarterly, 28(1):75–105.
International Organization for Standardization (2005). In-
formation technology – security techniques – code of
practice for information security management. Tech-
nical Report ISO/IEC 27002:2005, International Or-
ganization for Standardization, Geneva.
HEALTHINF 2011 - International Conference on Health Informatics
68